Posts about Threat Research (11)

Zimperium Customers Protected From Monokle Malware

Android
2 minutes
Jul 26, 2019
According to Threatpost, another new malicious Android app - dubbed “Monokle”- is gaining attention. While Monokle has some interesting capabilities
Read Full Post

The State of Mobile Device Threats: 2019 H1 Mobile Threat Report

Threat Research
1 minutes
Jul 23, 2019
As the worldwide leader in mobile threat defense (MTD), no company protects more enterprise mobile devices than Zimperium. As a result, we have incredibly
Read Full Post

Latest Android Malware is Not a Surprise; Zimperium Customers Protected

Android
3 minutes
Jul 15, 2019
According to news reports, a new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module.  
Read Full Post

5 Must-Have Sections For Every Enterprise Mobile Security RFP - Must-Have #4: Security Technology & Workflow Integrations

Threat Research
1 minutes
Jul 09, 2019
Our fourth webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Security
Read Full Post

The Mobile Watering Hole: How A Sip Leads to A Trojan Compromise

Threat Research
67 minutes
Jun 17, 2019
"Watering Hole" is a cyber attack strategy in which the victim is a particular group (organization, industry, or region). In this attack, the attacker
Read Full Post

WhatsApp Buffer Overflow Vulnerability: Under the Scope

Android
10 minutes
Jun 14, 2019
Researcher: Chilik Tamir (@_coreDump)   Recently, Zimperium blogged about the new WhatsApp vulnerability disclosed by Facebook on May 13th. This
Read Full Post

CVE-2019-8545: Vulnerability in IOHIDFamily.kext

Threat Research
1 minutes
Jun 10, 2019
Summary A local user may be able to cause unexpected system termination or read kernel memory. Details In the function
Read Full Post

It’s Not Your Father’s Endpoint - What if a Mobile Device is Attacked?

Threat Research
2 minutes
May 20, 2019
In my first blog, I discussed why mobile devices are the likely choice for savvy attackers since they typically have no endpoint protection. Let's
Read Full Post